Below are registration links and descriptions for all upcoming webcasts.
Automating Detection & Response to Phishing Attacks
September 26, 2017
1:00 PM MTRegister Now
Phishing is often the bane of a security analyst's existence. Even with all of the fancy tools in place, organizations still need to be prepared to handle targeted attacks, scams, and generic spam as they continue to reach end users. The toughest part is the fact that analyzing, tracking, and reporting on these attacks is a massive time sink that costs organizations valuable time and resources.
LogRhythm’s Greg Foss is developing an open-source toolset to help streamline and automate the entire process of tracking, analyzing, and responding to phishing emails without the need for commercial software. The Phishing Intelligence Engine (PIE) is a PowerShell Active Defense framework that continuously evaluates message trace logs for malicious contents, and dynamically responds as threats are identified or emails are reported.
Join Paul Asadoorian and Greg for this phishing prevention-geared webcast!
Monitoring Privileged Accounts with the Windows Security Log to Catch Lateral Movement by Mimikatz and other Credential Harvesting
October 5, 2017
12:00 PM ETRegister Now
Keeping tabs on where privileged accounts are being used and spotting anomalies is a key threat hunting activity. This is especially true because of the many ways attackers have figured out to harvest privileged account credentials.
But with all the users and endpoints on your network – not to mention the quantity of logon events – how do you know when logon sessions are privileged?
The good news is that Windows provides event ID 4672 which is logged whenever an account logs on that holds any user rights in Windows designated as admin-equivalent.
Please join LogRhythm and UWS for this deeply technical real training for free event.
Building a Cybersecurity Architecture to Combat Today’s Risks
October 25, 2017
11:00 AM MTRegister Now
Layered defense has traditionally been the modus operandi of IT security, but this approach can't be counted on to stand up to today's threats and attacks. In addition, attack surfaces are growing every day as companies adopt technologies like cloud and the Internet of Things. We'll help you rethink IT security from a strategic, architectural perspective and outline ways to build a comprehensive set of defenses that can discourage and repel attackers.